Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Board Members' Guide to Cyber Governance and Leadership

Last week, I had the opportunity to moderate a panel at the NACD Summit, where I was joined by: Deven Sharma, Former President at S&P; John Katko, Former Member of U.S. House of Representatives; and Aaron Hughes, CISO at Albertsons. The National Association of Corporate Directors (NACD) holds its summit annually to empower directors and transform boards to be future ready. Our panel discussion focused on how board members can strategically oversee their organizations’ cybersecurity resilience.

Top F5 WAF Alternatives in 2023

F5 Cloud WAF combines signature and behaviour-based threat detection mechanisms to protect applications, regardless of the deployment location. It protects against injection attacks, session hijacking, cross-site scripting, man-in-the-middle attacks, and numerous other vulnerabilities, with continuously updated policies to shield against emerging threats.

Privilege Escalation and Identity in the Age of AI: Leveraging PAM for Enhanced Security

The intersection of privilege escalation and identity is taking on new dimensions with the advent of Artificial Intelligence (AI). As AI becomes increasingly integrated into our lives, it both challenges and reinforces existing notions of privilege and identity. In this blog, we'll explore what privilege escalation means in the context of AI and how it influences our understanding of personal and societal identities.

Can You Get Hacked by Replying to a Scam Text?

No, you cannot get hacked by replying to a scam text, but you can get hacked from a scam text if you click on a malicious link the scammer sends you. According to the Federal Trade Commission (FTC), Americans lost a total of $330 million from scam texts in 2022, making scam texts a serious threat to your online security. Continue reading to learn how to spot scam texts and the common scam text tactics that scammers use.

Phishing Attacks Surge By 173% In Q3, 2023; Malware Threats Soar By 110%

A new report from Vade Secure has found that phishing attacks rose by 173% in the third quarter of 2023, while malware threats have increased by 110%. “While hackers were busy throughout Q3, they were most active in August, sending more than 207.3 million phishing emails, nearly double the amount from July,” the researchers write.

Facial and Dental Specialist, Fairfax, Announces Leak; 235,000+ Victims

Fairfax Oral and Maxillofacial Surgery serves the residents of Northern Virginia and the surrounding region. They employ a ten-person surgery team with six locations. Fairfax has been the target of a data breach, creating over 235,000 potential victims; your information may be at risk if you’ve been a patient of an associated facility.

Insights from our 2023 Phishing Threat Trends Report

Cybercriminals never take a day off, and nor should your email protection. The online threat landscape is constantly evolving, and our Threat Intelligence team has unearthed some incredibly sophisticated threats over the last 10 months. To help equip you in the fight against phishing attacks, such as business email compromise, we published the Phishing Threat Trends Report, which outlines and explains the most common threats we’ve seen so far in 2023.

The Best IoT Solutions to Revolutionise Your Business in 2023

Ready to revolutionise your business with the power of IoT? As the digital world advances, IoT solutions bring countless possibilities to transform industries, streamline processes, and enhance customer experiences. Let’s dive into the world of IoT and explore how it can revolutionise your business, in 2023 and beyond!

Release Spotlight: Trends Page Upgrade and Bulk Data Export Functionality

In vulnerability management (VM), the task of sifting through vast amounts of data to pinpoint critical insights can feel like searching for a needle in a haystack, specifically a haystack with many precious needles that all look alike. And, of course, the one needle you’re looking for is mission-critical and can mean the difference between securing your business and leaving it open to attack.

Things You Must Know About Cyber Security in the Cloud

In our rapidly evolving and interconnected digital environment, cloud computing has transformed the manner in which organizations store, manage, and retrieve their data and software applications. The cloud offers unparalleled advantages, such as scalability, flexibility, and cost-efficiency. Nevertheless, these advantages also bring an increased emphasis on the significance of cybersecurity within the cloud.